vulnerability
Rocky Linux: CVE-2026-1642: nginx (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:C/A:N) | Mar 5, 2026 | Mar 9, 2026 | Mar 31, 2026 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
Mar 5, 2026
Added
Mar 9, 2026
Modified
Mar 31, 2026
Description
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Solutions
rocky-upgrade-nginxrocky-upgrade-nginx-corerocky-upgrade-nginx-core-debuginforocky-upgrade-nginx-debuginforocky-upgrade-nginx-debugsourcerocky-upgrade-nginx-mod-develrocky-upgrade-nginx-mod-http-image-filterrocky-upgrade-nginx-mod-http-image-filter-debuginforocky-upgrade-nginx-mod-http-perlrocky-upgrade-nginx-mod-http-perl-debuginforocky-upgrade-nginx-mod-http-xslt-filterrocky-upgrade-nginx-mod-http-xslt-filter-debuginforocky-upgrade-nginx-mod-mailrocky-upgrade-nginx-mod-mail-debuginforocky-upgrade-nginx-mod-streamrocky-upgrade-nginx-mod-stream-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.